This month, our team have been focusing on file downloads to help customers make sense of any sensitive data that may be at risk, as well as bringing out another new integration.
Understanding exactly what actions a user is taking is a crucial element of data security.
This month, our team have been focusing on file downloads to help customers make sense of any sensitive data that may be at risk, as well as bringing out another new integration!
Scroll down for a whistlestop tour of our October product updates.
Employees downloading sensitive data to their devices can be extremely risky for any organisation due to the risk of a compromised endpoint, and the potential spread of confidential information. We want every one of our customers to be able to keep their sensitive data protected, at every level.
Metomic Events will now allow our customers to see which files have been downloaded, across all of our integrations. And this is just the beginning. Over the next few months, Events will grow to encompass even more user-focused activities such as 'moved by', and 'deleted by'.
You can now start protecting sensitive data in Linear with our new integration!
Scan your workspace to identify high-risk files in your projects, and understand where sensitive data is stored across your issues, cycles, roadmaps, and workflows.
Email info@metomic.io to arrange a demo and see it in action.
Less of a hot-take this month, but a great article I thought I would share on Halloween. I particularly love what this article has to say about dormant or 'mummified' data, that lies in wait for a data breach.
"Mummified data has been dormant for so long that it lies patiently, waiting to unleash a data breach as soon as it is discovered. More often than not, mummified data is not managed or secured by an organization, therefore making it very hard to regulate and keep a close eye on. Dormant data widens any organizations attack surface, making it an easy victim to potential data breaches, if malicious actors discover it.
In order to stay ahead of this lingering threat, organizations must establish robust data lifecycle management processes that restrict access to dormant data, securely archive data, and eventually ensure the data is securely disposed of. Especially when it is no longer useful or required to be kept."